Enhancing the RC4 Algorithm by Eliminating the Initiative Vector (IV) Transmission
Received: 8 October 2024 | Revised: 19 November 2024 | Accepted: 23 November 2024 | Online: 2 February 2025
Corresponding author: Salmah Fattah
Abstract
The Rivest Cipher RC4 encryption algorithm is commonly utilized to generate keys of varying lengths. Despite its rapid processing speed, vulnerabilities within the algorithm have made it susceptible to exploitation, allowing attackers to compromise it within a matter of minutes. This paper introduces an innovative approach to address the vulnerabilities of the RC4 encryption algorithm by employing an Initiative Vector (IV). The proposed method incorporates a lengthy random text without transmitting an initialization vector. The proposed solution was rigorously validated, demonstrating performance comparable to existing solutions while simultaneously expanding the range of potential solutions and mitigating security threats. Further exploration into the use of a complex equation is recommended for calculating the swapping value j while maintaining the same high level of performance.
Keywords:
encryption algorithm, file protection, cryptography, RC4, Initiative Vector (IV)Downloads
References
M. Safaei Pour, C. Nader, K. Friday, and E. Bou-Harb, "A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security," Computers & Security, vol. 128, May 2023, Art. no. 103123.
H. N. Thakur, A. Al Hayajneh, K. Thakur, A. Kamruzzaman, and M. L. Ali, "A Comprehensive Review of Wireless Security Protocols and Encryption Applications," in 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, Jun. 2023, pp. 373–379.
C. Slamet, U. Syaripudin, F. M. Kaffah, and B. E. Tiasto, "Implementation of Rivest Cypher 4 algorithm in Security Assertion Mark-up Language protocols on Single Sign-On services," IOP Conference Series: Materials Science and Engineering, vol. 1098, no. 3, Mar. 2021, Art. no. 032109.
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York: John Wiley & Sons Inc, 1996.
M. A. Alrammahi and H. Kaur, "Development of Advanced Encryption Standard (AES) Cryptography Algorithm for Wi-Fi Security Protocol," International Journal of Advanced Research in Computer Science, vol. 5, no. 3, pp. 62–67, 2014.
R. L. Rivest, "The RC5 encryption algorithm," in Fast Software Encryption, Leuven, Belgium, 1995, pp. 86–96.
K. Aggarwal, J. Kaur Saini, and H. K. Verma, "Performance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers," International Journal of Computer Applications, vol. 68, no. 25, pp. 10–16, Apr. 2013.
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4," in Selected Areas in Cryptography, Toronto, Canada, 2001, pp. 1–24.
S. Paul and B. Preneel, "Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator," in Progress in Cryptology - INDOCRYPT 2003, New Delhi, India, 2003, pp. 52–67.
G. Paul and S. Maitra, RC4 Stream Cipher and Its Variants. CRC Press, 2011.
M. M. Hammood, K. Yoshigoe, and A. M. Sagheer, "Enhancing security and speed of RC4," International Journal of Computing and Network Technology, vol. 3, no. 2, 2015.
J. Xie and X. Pan, "An improved RC4 stream cipher," in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Taiyuan, China, Oct. 2010.
E. J. Madarro-Capó, C. M. Legón-Pérez, O. Rojas, and G. Sosa-Gómez, "Measuring Avalanche Properties on RC4 Stream Cipher Variants," Applied Sciences, vol. 11, no. 20, Oct. 2021, Art. no. 9646.
C. Sun et al., "A high-speed and low-latency hardware implementation of RC4 cryptographic algorithm," International Journal of Circuit Theory and Applications, vol. 51, no. 12, pp. 5980–5996, 2023.
S. Kareem and A. M. Rahma, "A Modification on Key Stream Generator for RC4 Algorithm," Engineering and Technology Journal, vol. 38, no. 2B, pp. 54–60, Jul. 2020.
A. F. Doni, O. A. H. Maria, and S. Hanif, "Implementation of RC4 Cryptography Algorithm for Data File Security," Journal of Physics: Conference Series, vol. 1569, no. 2, Jul. 2020, Art. no. 022080.
R. Saha, G. Geetha, G. Kumar, T.-H. Kim, and W. J. Buchanan, "MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features," IEEE Access, vol. 7, pp. 172045–172054, 2019.
S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, "Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems)," Wireless Personal Communications, vol. 116, no. 3, pp. 1713–1742, Feb. 2021.
U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, "A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review," Sensors, vol. 23, no. 8, Jan. 2023, Art. no. 4117.
T. Guo, Y. Feng, and Y. Fu, "A new form of initialization vectors in the FMS attack of RC4 in WEP," Procedia Computer Science, vol. 183, pp. 456–461, Jan. 2021.
Z. A. Mohammed, H. Q. Gheni, Z. J. Hussein, and A. K. M. Al-Qurabat, "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques," Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12694–12701, Feb. 2024.
Downloads
How to Cite
License
Copyright (c) 2025 Waleed Abdelrahman Yousif Mohammed, Salmah Fattah, Khalid Mohammed Osman Saeed, Ashraf Osman Ibrahim, Safaa Eltahier

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.